Endpoint Security Threat Detection2 Min Read February 2, 2026 Securing the Mid-Market Across the Complete Threat Lifecycle For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an…
Endpoint Security Threat Intelligence3 Min Read February 2, 2026 eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been…
Cyber Espionage Endpoint Security3 Min Read January 28, 2026 Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
Endpoint Security Threat Intelligence,4 Min Read December 26, 2025 China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary…
Endpoint Security Vulnerability1 Min Read December 25, 2025 CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw impacting Digiever DS-2105 Pro network video recorders…
Endpoint Security Malware2 Min Read December 24, 2025 New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally…
Endpoint Security Threat Intelligence4 Min Read December 19, 2025 Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector…
Endpoint Security Threat Intelligence5 Min Read December 17, 2025 Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time Modern security teams often feel like they're driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs…
Endpoint Security Vulnerability4 Min Read December 10, 2025 Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an…
Endpoint Security Ransomware2 Min Read December 9, 2025 Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced…
Cybercrime Endpoint Security3 Min Read December 4, 2025 Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks…
Endpoint Security Network Security4 Min Read November 19, 2025 Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security…
Cyber Espionage Endpoint Security2 Min Read October 31, 2025 China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage…
Endpoint Security Network Security3 Min Read October 31, 2025 A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests…
Endpoint Security Malware4 Min Read August 30, 2025 Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source endpoint monitoring…
Application Security Endpoint Security4 Min Read August 25, 2025 Simple Steps for Attack Surface Reduction Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the…